1995
DOI: 10.1056/nejm199511233332112
|View full text |Cite
|
Sign up to set email alerts
|

The Computer-Based Patient Record and Confidentiality

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
25
0
1

Year Published

1997
1997
2018
2018

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 59 publications
(26 citation statements)
references
References 4 publications
0
25
0
1
Order By: Relevance
“…Indeed, the computer tool makes possible to heighten possibilities of transmission of the information and the fear persists that personal data could be stolen (21). The history of computer communication systems shows that, despite the precautions taken by program developers, it is difficult to prevent data from being intercepted (22). This is the most challenging question for clinicians : 33% of them cannot express an opinion on the storage of data on the Internet.…”
Section: ← Toward Data Processing Interest and Ethical Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…Indeed, the computer tool makes possible to heighten possibilities of transmission of the information and the fear persists that personal data could be stolen (21). The history of computer communication systems shows that, despite the precautions taken by program developers, it is difficult to prevent data from being intercepted (22). This is the most challenging question for clinicians : 33% of them cannot express an opinion on the storage of data on the Internet.…”
Section: ← Toward Data Processing Interest and Ethical Issuesmentioning
confidence: 99%
“…There is thus a risk of revealing confidentiality through a cross-checking of data from various computer files and a risk of infringement of individual freedoms to the benefit of certain organizations, in particular administrative, financial or insurance companies (22)(23)(24). On the other hand, IT tools are not always reliable in their handling (complexity of procedures, equipment breakdown or theft, loss or alteration of files, viruses, etc.).…”
Section: ← Toward Data Processing Interest and Ethical Issuesmentioning
confidence: 99%
“…The US government's Office of Technology Assessment [8] and the UK audit Commission [9] confirmed that healthcare appears to be one of the most attractive targets of attacks: both internal and external abusers attempt to harm the HCCS security (invasion of privacy, hacking, virus, fraud, theft of data or software). The threat against privacy is increased by data aggregation that networked computer systems encourage.…”
Section: Some Identified Risksmentioning
confidence: 99%
“…The lack of privacy and confidentiality of patient records is not a new problem. In 1995, 24 people in Maryland were indicted for selling patient information from the state's Medicaid database to four HMOs (Woodard, 1995). As stated by Woodard (1995), the biggest threat to digital patient records is confidentiality.…”
Section: Introductionmentioning
confidence: 99%